SlideShare a Scribd company logo
1 of 13
Website: www.batracomputercentre.com P.no.: 9729666670, 0171-4000670
One of the overwhelming advantages of the computer lies in its very
necessity. Computer technology and use is of critical importance. Its ability
for communication and storing data would represent another advantage. If
connected to the internet, its ability to obtain resources would be another
attribute. Along with data collection, the computer features different methods
and manners to present this data, which makes it advantageous to the
user. The disadvantages are going to be difficult to articulate because
computers have become such a mainstay in our existence. I think that one
disadvantage would be our dependence on them. Computers are now
needed for so much, we have a natural dependence on them. This proves to
be disastrous when individuals have their computers lost or stolen, or when
identity theft, a concoction of computers, happens to individuals.
Computers make it extremely easy to store and access data, but their increasing use
has led to an extreme level of dependence on them, which can create a number of
problems if and when computers malfunction. A power outage can render entire
businesses or institutions essentially inoperable without the use of computers. Data
that is stored on computers can also be lost permanently if not backed up properly, and
back up methods are not entirely dependable.
In a similar vein, personal data stored on computers is often extremely vulnerable to
digital theft. Data regarding bank accounts, credit cards, social security numbers and
more is commonly transmitted online, and security protocols to protect this data are not
always effective.
Computers also create the added potential for distraction. The sheer amount of
content on the Internet makes it possible to spend almost limitless time browsing blogs,
playing games or chatting with friends. This can dramatically detract from productivity,
whether it's at work, in school or at home. Computers can also hinder social
interactions. Many users are often distracted from real life interactions by the draw of
computers, diminishing social relationships.
Computer Software
Definition. Software is a generic
term for organized collections
of computer data and instructions,
often broken into two major
categories: system software that
provides the basic non-task-
specific functions of the computer,
and application software which is
used by users to accomplish
specific tasks.
Computer hardware is the collection
of physical parts of
a computer system. This includes the
computer case, monitor, keyboard,
and mouse. It also includes all the
parts inside the computer case, such
as the hard disk drive, motherboard,
video card, and many
others. Computer hardware is what
you can physically touch.
Info.jatinbatra@gmail.com
9729666670, 0171-4000670
Basic  computer  courses in Ambla Cantt! Batra Computer Centre
Basic  computer  courses in Ambla Cantt! Batra Computer Centre

More Related Content

What's hot

Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Imjessicalaverne
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalJISC Legal
 
Dwyer ISSA Presentation
Dwyer ISSA PresentationDwyer ISSA Presentation
Dwyer ISSA PresentationCathy Dwyer
 
Uit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revidrissss dddd
 
Role of Information Technology in Human Resource Management
Role of Information Technology in Human Resource ManagementRole of Information Technology in Human Resource Management
Role of Information Technology in Human Resource ManagementDr. C.V. Suresh Babu
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 

What's hot (18)

Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Im
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
Dwyer ISSA Presentation
Dwyer ISSA PresentationDwyer ISSA Presentation
Dwyer ISSA Presentation
 
Uit9 ppt ch09_au_rev
Uit9 ppt ch09_au_revUit9 ppt ch09_au_rev
Uit9 ppt ch09_au_rev
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Role of Information Technology in Human Resource Management
Role of Information Technology in Human Resource ManagementRole of Information Technology in Human Resource Management
Role of Information Technology in Human Resource Management
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Web 3.0
Web 3.0Web 3.0
Web 3.0
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 

Similar to Basic computer courses in Ambla Cantt! Batra Computer Centre

Cloud computing & disadvantages of technology
Cloud computing & disadvantages of technologyCloud computing & disadvantages of technology
Cloud computing & disadvantages of technologynomibuilder
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxDCEISO580thACWW
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and YouAjboyDiog
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of itKhan Yousafzai
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeIan Lee
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
 

Similar to Basic computer courses in Ambla Cantt! Batra Computer Centre (20)

Topic 7
Topic 7Topic 7
Topic 7
 
Abhay pratap singh rajawat
Abhay pratap singh rajawatAbhay pratap singh rajawat
Abhay pratap singh rajawat
 
Cloud computing & disadvantages of technology
Cloud computing & disadvantages of technologyCloud computing & disadvantages of technology
Cloud computing & disadvantages of technology
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
Unit iii FMIS
Unit iii FMISUnit iii FMIS
Unit iii FMIS
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Uses of computer networks
Uses of computer networksUses of computer networks
Uses of computer networks
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Computer in Society
Computer in SocietyComputer in Society
Computer in Society
 
Systems analysis and design lecture 1
Systems analysis and design lecture 1Systems analysis and design lecture 1
Systems analysis and design lecture 1
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian Lee
 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Basic computer courses in Ambla Cantt! Batra Computer Centre

  • 2.
  • 3.
  • 4. One of the overwhelming advantages of the computer lies in its very necessity. Computer technology and use is of critical importance. Its ability for communication and storing data would represent another advantage. If connected to the internet, its ability to obtain resources would be another attribute. Along with data collection, the computer features different methods and manners to present this data, which makes it advantageous to the user. The disadvantages are going to be difficult to articulate because computers have become such a mainstay in our existence. I think that one disadvantage would be our dependence on them. Computers are now needed for so much, we have a natural dependence on them. This proves to be disastrous when individuals have their computers lost or stolen, or when identity theft, a concoction of computers, happens to individuals.
  • 5. Computers make it extremely easy to store and access data, but their increasing use has led to an extreme level of dependence on them, which can create a number of problems if and when computers malfunction. A power outage can render entire businesses or institutions essentially inoperable without the use of computers. Data that is stored on computers can also be lost permanently if not backed up properly, and back up methods are not entirely dependable. In a similar vein, personal data stored on computers is often extremely vulnerable to digital theft. Data regarding bank accounts, credit cards, social security numbers and more is commonly transmitted online, and security protocols to protect this data are not always effective. Computers also create the added potential for distraction. The sheer amount of content on the Internet makes it possible to spend almost limitless time browsing blogs, playing games or chatting with friends. This can dramatically detract from productivity, whether it's at work, in school or at home. Computers can also hinder social interactions. Many users are often distracted from real life interactions by the draw of computers, diminishing social relationships.
  • 6.
  • 7. Computer Software Definition. Software is a generic term for organized collections of computer data and instructions, often broken into two major categories: system software that provides the basic non-task- specific functions of the computer, and application software which is used by users to accomplish specific tasks.
  • 8. Computer hardware is the collection of physical parts of a computer system. This includes the computer case, monitor, keyboard, and mouse. It also includes all the parts inside the computer case, such as the hard disk drive, motherboard, video card, and many others. Computer hardware is what you can physically touch.
  • 9.
  • 10.